Last week on the freeware review, I wrote about the simplicity of packet sniffing and analyzing with Ethereal. I revealed how easy it was for anyone to tap sensitive data like login information, credit card numbers, social security number, and mission-critical emails traveling on the network. As promised, I will reveal how to actually prevent packet-sniffing software from reading your sensitive data.

As I previously explained, packet analysis passively listens into a network and then extracts the important data, which is usually in plaintext. The key to hampering packet analysis is encrypting that data sent on the network so that it is not read in plain text. The encrypted data that packet analyzers gather is pretty useless without an encryption key. While it is possible for crackers to obtain the key, encryption makes the process a lot longer (and sometimes nearly impossible). There are a couple common ways to do this.

Manual File or Email Encryption

While this is the simplest way to avoid data theft, in the long run, it can also be the most tedious. Basically, every email message and every attachment sent is encrypted with PGP (Pretty Good Privacy) algorithms.

Pros

Not Really Any

Cons

Both the sender and the receiver need to agree on the same encryption key and have the same special software to unlock the data.

This only works with data chunks like email and files. Regular web browsing and login information is still done in plaintext.

SSL (HTTPS)

On some websites like Yahoo! and eBay, there is a function that allows you to “securely” login. In the URL address bar, if you see “https” instead of “http,” you’re in good shape. But most of the time, this is only available in financial sites.

Pros

Streamlined so that you don’t even notice it is working

All modern browsers support it.

Cons

This usually only applies to the HTTP (port 80) protocol. This will not work with any other protocol like FTP, Instant Messaging, and Email.

Remote Computing

Pros

You keep the actual files on a server. You never send the complete data over the public network.

Cons

This can become very slow

Requires a computer at home to be always on

VPN

Virtual Private Networking is my favorite and recommended method of obfuscating data theft. Basically, it creates an encrypted virtual network connection from your computer to your server. Pretend you connect to your VPN from a public network. All information that you access on the Internet is encrypted as it is sent to your home network first. There, the server decrypts that data then sends it across the Internet. Therefore, nobody in the public network can see what you are doing since it is all encrypted. VPN works sort of like a seamless proxy server.

Pros

Seamless integration with all programs

If coupled with any of the methods above, you achieve at least double encryption.

Cons

Your network download speed is capped by the upload speed of your home network gateway.

Requires a computer at home to be always on

Requires a bit of configuration

Windows XP PPTP VPN Setup

I regularly use the public networks at the library, school, hotels, and Starbucks. I’ve found that in the long run, the most convenient and secure method of packet sniffing circumvention is virtual private networking. It is really easy to set it up in Windows as well!

VPN Server

Go to “Network Connections” in the “Control Panel.”

“Create a new connection” with the “Network Connection Wizard.”

“Set up an advanced connection.”

‘”Accept Incoming Connections.”

Skip “Devices for Incoming Connections.”

“Allow virtual private connections.”

Then, select which accounts will be able to remotely connect to the VPN. On this step, I just create a specific account just for VPN with no privileges.

For “Networking Software,” make sure that “Internet Protocol (TCP/IP)” is selected. I would also include “File and Printer Sharing for Microsoft Networks” but that’s just me.

Tim-
It may not be working due to your ISP blocking that port. For example Verizon DSL doesn’t want me to run a website from my house, so they block port 80. therefor if i really want a website i have to use a different port (maybe like 8000 :D) It may be the same problem for you.

You are saying that all Internet communications is sent through the home server first. But I didn’t see any option for that all-proxying behavior.

What if I just want to access my home machine (or someone’s machine I’m administering) via a secure connection, specifically including file shares, and still have other Internet access behave normally?

I`m using http://www.primovpn.net right now, it`s very good, but I`m looking for something cheaper as I`m not a everyday VPN user. But VPN service much better than proxy sites and moreover its easy to use.downloading is awesome.

If you’re using a VPN for this sort of stuff, you’d be not be wise enough to use one which doesn’t know your identity. I know of at least one where you can pay with Bitcoins and never give out your name. In my opinion, that’s perfect! http://www.sunvpn.net/ Its very easy to use.Its very cheap.It’s much better than proxy websites because it contains less amount of virus than proxy website. Its very easy to handle and is useful in various purposes.

You actually make it seem so easy with your presentation but I find this matter to be actually something that I
think I would never understand. It seems too complex and extremely broad
for me. I am looking forward for your next post, I will try to get the hang of it!

Fantastic blog! Do you have any recommendations for aspiring writers?
I’m planning to start my own website soon but I’m a little lost on everything.
Would you advise starting with a free platform like WordPress or
go for a paid option? There are so many choices out there
that I’m totally overwhelmed .. Any ideas? Thanks a lot!

I’ve been surfing online more than three hours today, yet I never found any interesting article like yours.
It’s pretty worth enough for me. In my view, if
all site owners and bloggers made good content as you did,
the web will be a lot more useful than ever before.

Hello! This is my 1st comment here so I just wanted to
give a quick shout out and say I truly enjoy reading through your blog posts.
Can you recommend any other blogs/websites/forums that go over
the same topics? Thanks for your time!

I am not sure where you’re getting your information, but great topic.
I needs to spend some time learning more or understanding more.
Thanks for wonderful info I was looking for this info for
my mission.

Hi there! I just wanted to ask if you ever have any trouble with hackers?
My last blog (wordpress) was hacked and I ended up losing a
few months of hard work due to no data backup. Do you have any solutions to
prevent hackers?

Hi there! I know this is kind of off topic but I was
wondering if you knew where I could find a captcha plugin for my
comment form? I’m using the same blog platform as yours
and I’m having difficulty finding one? Thanks a lot!

Its such as you learn my mind! You appear to grasp so much approximately this, like you wrote the guide in it or something.
I believe that you can do with some p.c. to force the message home a bit,
but instead of that, this is magnificent blog. A great read.
I’ll definitely be back.